首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
云计算在各行业的创新应用 , 衍生出诸多新型业态和新型商业模式, 产生了巨大的 经济价值和社会价值,主要体现在: 云计算集中了信息技术资源和服务,大幅提高了 IT资源的 应用效率; 降低了应用技术门槛, 最大限度扩展用户规模; 集中整合了数据资源, 挖掘出大数 据价值潜力; 引起体制机制的变革, 以技术方式突破体制屏障; 加强了信息系统综合集成, 实 现智慧管理与服务。 云计算应用创新具有独特的价值生成机理。 首先, 云计算通过将市场交 易双方的博弈改变为无限重复动态博弈, 形成诚信自律机制, 提高了市场交易效率从而形成 增值; 其次,云计算的创新应用向资本市场展示了收益前景,以内部学习效应形成了以未来收 益弥补当前亏损的资本补偿机制 , 挖掘了知识价值; 第三, 云计算形成了新型互联网商业平 台 ,以交叉补贴机制确保长期可持续经营,创造了低成本、高收益的价值增值模式。 鉴于云计 算平台已经成为涉及公共利益、承载公共服务的信息基础设施, 建议将云设施视为信息基础 设施,纳入监管保护体系; 制定针对云计算的知识产权和个人信息保护措施,鼓励云计算创新 应用 ;开展多层次试点示范,帮助中小企业和社会大众利用云计算创新创业。  相似文献   

2.
This paper presents a systematic approach to develop a resilient software system which can be developed as emerging services and analytics for resiliency. While using the resiliency as a good example for enterprise cloud security, all resilient characteristics should be blended together to produce greater impacts. A framework, cloud computing adoption framework (CCAF), is presented in details. CCAF has four major types of emerging services and each one has been explained in details with regard to the individual function and how each one can be integrated. CCAF is an architectural framework that blends software resilience, service components and guidelines together and provides real case studies to produce greater impacts to the organizations adopting cloud computing and security. CCAF provides business alignments and provides agility, efficiency and integration for business competitive edge. In order to validate user requirements and system designs, a large scale survey has been conducted with detailed analysis provided for each major question. We present our discussion and conclude that the use of CCAF framework can illustrate software resilience and security improvement for enterprise security. CCAF framework itself is validated as an emerging service for enterprise cloud computing with analytics showing survey analysis.  相似文献   

3.
基于云计算信息处理系统体系结构设计   总被引:2,自引:0,他引:2  
刘燕 《科技通报》2012,28(8):100-102,106
研究面向云计算的智能管理系统的体系架构与集约化数据管理的理论和方法。建立面向云计算的智能管理系统原型,数据空间的模式规范化理论和需求归约化方法,实现云计算个性化管理;采用分离式管理架构,实现按需双向动态一致性维护,多源、非结构数据的抽取、融合与分析;建立面向数据安全与隐私保护的安全体系结构,保证系统中各类数据的安全和可信。  相似文献   

4.
Today’s data is sensitive that requires privacy and security both from the cloud service providers (CSP) as well as from users in its all the form of data states: data at rest, while transferring data, enquiring data, and processing the data. Cloud computing has been applied in the health sector, national security services, banking and other business and companies that store confidential data into the cloud as we have seen in recent years. Therefore, information and data security is a crucial issue that needs to be addressed thoroughly in the cloud computing business. This research deals with the performance analysis of recent cloud data security models. This paper proposes cloud data security models based on Business Process Modeling Notations (BPMN) and simulation results can reveal performances issues related to data security as part of any organizations initiative on Business process management (BPM).  相似文献   

5.
Although smart service systems have received increasing attention in information systems research, their affordances and constraints processes are less studied. In this study, we draw on interpretive case study methodology and technology affordances and constraints theory to investigate a smart service system use for seaport security in Ghana. With insights from the case of Ghana, we introduce an affordance constraints process as a framework to complement the existing affordance actualisation process framework in information systems. Thus, this study contributes to affordance theory with a new constraints process. The study’s findings show that smart service systems for seaport security afford autonomous access control, real-time security monitoring, and autonomous data capturing for analytics and reporting. However, such affordances can be constrained by power and internet outages, limited storage capacity, and device breakdowns. From these findings, we discuss implications for theory, research, and practice as well as limitations and directions for future research.  相似文献   

6.
Cloud computing is a new information technology (IT) paradigm that promises to revolutionize traditional IT delivery through reduced costs, greater elasticity, and ubiquitous access. On the surface, adopting cloud computing requires a firm to address many of the same concerns they face in adopting any enterprise IT. However, cloud technologies also offer new pricing and deployment strategies that are unavailable in traditional enterprise solutions. It is unclear how previous research frameworks of enterprise IT adoption relate to these new adoption strategies. To bridge this gap in the literature, our study uses the technology–organization–environment (TOE) framework of innovation diffusion theory to develop a cloud service adoption model that deals with not only adoption intention, but also pricing mechanisms and deployment models. Our research model has been empirically tested using 200 Taiwanese firms. We found that: (1) Cloud adoption is still at its initial stage, since the adoption rates are very low; (2) the perceived benefits, business concerns, and IT capability within the TOE framework are significant determinants of cloud computing adoption, while external pressure is not; (3) firms with greater IT capability tend to choose the pay-as-you-go pricing mechanism; (4) business concern is the most important factor influencing the choice of deployment model, with higher concerns leading to private deployment options.  相似文献   

7.
Cloud computing is a current trend that reveals the next-generation application architecture and it is estimated that by 2013 the cloud market will have reached $8.1bn. While cloud services such as webmail, Flickr and YouTube have been widely used by individuals for some time, it not until relatively recently that organisations have began to use cloud services as a tool for meeting their IT needs. This study aims to investigate how cloud computing is understood by IT professionals and the concerns that IT professionals have in regard to the adoption of cloud services. The study was carried out in Taiwan and used a survey by interview approach to understand IT professionals’ understandings and concerns about cloud computing. The findings of the study suggest that while the benefits of cloud computing such as its computational power and ability to help companies save costs are often mentioned in the literature, the primary concerns that IT managers and software engineers have are compatibility of the cloud with companies’ policy, IS development environment, and business needs; and relative advantages of adopting cloud solutions. The findings also suggest that most IT companies in Taiwan will not adopt cloud computing until the uncertainties associated with cloud computing, e.g. security and standardisation are reduced and successful business models have emerged.  相似文献   

8.
21世纪,云计算作为一种以数据为中心的新型网络计算方式,已经深刻地影响到了互联网的运作和服务模式。做为公安高校专业性较强的图书馆,面对这种IT新技术带来的强烈冲击,必将受到更为严峻的挑战和考验。如今,云计算已经使图书馆的文献信息服务工作进入了一个崭新的发展阶段;应用云计算的模式,将从根本上改变公安高校图书馆传统文献信息的服务理念。所以,公安高校图书馆应该尽快适应云环境,抓住机遇,全力应对云计算泛知识环境带来的挑战;加快开发具有公安警察文化特色的专业数据库步伐,并对如何开发高质量的公安警察类特色数字资源进行了阐述。  相似文献   

9.
Technology advancements in cloud computing, big data systems, No-SQL database, cognitive systems, deep learning, and other artificial intelligence techniques make the integration of traditional ERP transaction data and big data streaming from various social media platforms and Internet of Things (IOTs) into a unified analytics system not only feasible but also inevitable. Two steps are prominent for this integration. The first, coined as forming the big-data ERP, is the integration of traditional ERP transaction data and the big data and the second is to integrate the big-data ERP with business analytics (BA). As ERP implementers and BA users are facing various challenges, managers responsible for this big-data ERP-BA integration are also seriously challenged. To help them deal with these challenges, we develop the SIST model (including Strategic alignment, Intellectual and Social capital integration, and Technology integration) and propose that this integration is an evolving portfolio with various maturity levels for different business functions, likely leading to sustainable competitive advantages.  相似文献   

10.
【目的/意义】从理论层面探究面向医院管理的数据驱动决策过程,深化医疗数据应用,拓宽情报学的问题 域,为跨学科情报学理论发展提供新的增长点。【方法/过程】通过对数据驱动决策相关研究的回顾,在新技术环境 下信息链理论、BASM模型等相关理论指导下,深入分析数据到决策的驱动路径,突出医院管理场景下的决策特征, 构建面向医院管理的数据驱动决策过程模型,最后以J医院的日间手术管理实践为案例进行了分析验证。【结果/结 论】面向医院管理的数据驱动决策模型以驱动要素、需求要素和支持要素为结构基础,协同面向医院管理决策的数 据处理过程和数据驱动的医院管理决策制定过程,实现面向医院管理的决策支持功能。【创新/局限】提出了面向医 院管理的数据驱动决策过程模型,融合了数据和决策的处理过程,并提出了支持要素。  相似文献   

11.
刘紫微  孙世强  刘春艳 《现代情报》2012,32(10):159-162
在分析政府信息资源的特点及流动特性的基础上,结合强大的云计算技术以及信息管理理论的最新成果,以基于云计算的政府信息资源集成模式研究为中心,将政府信息资源结构研究、政府信息资源的云化研究、政府云服务研究等联系起来,实现政府信息资源的集成、共享以及数据的自由、安全的流动。  相似文献   

12.
银行业在实现业务和数据集中处理的信息化架构后,随着业务的发展,面对数量越来越多、规模越来越大的批处理需求,如何提高计算资源的使用效率和灵活配置资源是银行信息中心不断面对的挑战。以资源和应用虚拟化为核心的云计算架构和技术正在不断发展和成熟,它可以有效地提高信息中心的资源使用,为批处理业务动态配置有效资源。针对以批处理中按照业务类型和处理流程进行资源配置的传统方法,提出了一种将业务流程进行优化分解成为可以进行独立并行处理任务的方法,可以在云计算环境下分组处理具有共同特征的计算和操作任务,实现优化资源调配。通过HadoopMapReduce并行计算架构进行模拟验证,初步实验结果表明了该方法在批处理执行效率、资源使用和灵活性方面的优势,在大量批处理业务领域(金融、证券、电子商务)具有一定的应用和研究价值。  相似文献   

13.
The number of firms that intend to invest in big data analytics has declined and many firms that invested in the use of these tools could not successfully deploy their project to production. In this study, we leverage the valence theory perspective to investigate the role of positive and negative valence factors on the impact of bigness of data on big data analytics usage within firms. The research model is validated empirically from 140 IT managers and data analysts using survey data. The results confirm the impact of bigness of data on both negative valence (i.e., data security concern and task complexity), and positive valence (i.e., data accessibility and data diagnosticity) factors. In addition, findings show that data security concern is not a critical factor in using big data analytics. The results also show that, interestingly, at different levels of data security concern, task complexity, data accessibility, and data diagnosticity, the impact of bigness of data on big data analytics use will be varied. For practitioners, the findings provide important guidelines to increase the extent of using big data analytics by considering both positive and negative valence factors.  相似文献   

14.
Derided, when it emerged in 2007 as a fad, cloud computing has proved to be a viable business model for remotely delivering IT services through the Web (and other media) on a pay-as-you-go basis. The flexibility of this emerging computing service has opened many possibilities for organizations. Drug companies and medical research centers are among those organizations that are likely to benefit from this new IT service model. As well as providing massive cost-savings, cloud computing could offer these organizations the opportunity to greatly enhance the efficiency of their operations. For cloud providers, this is a new field to expand their reach. The aim of this article is to explore this new development and the potential of cloud computing in contributing to the advancement of research in life science and explain why this IT service model (despite many of its problems) could be game-changer for companies engaged in this business.  相似文献   

15.
Cloud computing's primary layer of security is its widespread adoption by businesses due to its ability to provide easy, on-demand network access to a large pool of configurable processing resources. Pressure from developed-world governments to keep up with the latest IT trends makes it challenging for colleges around the world to adopt cloud computing in engineering education. Although cloud computing as a concept has become more popular in recent times and quite a few studies have been conducted, the adoption and application level is still very low, particularly in developing countries. This study provides a realistic framework for gauging the sustainability of a company model. While digitalization is widely acknowledged to be crucial, the study's results reveal that the perceived available options for business model innovation depend not only on the value proposition itself but also on the position in the value network. The primary goal of this research is to create a cloud computing service provider business model that is built on circular economy principles and can guarantee the sustainable usage of cloud computing resources.  相似文献   

16.
随着大数据时代的到来以及云计算技术的发展,计算机病毒也在迅速演化,传统的特征码技术已经无法应对当前网络的需求。因此为了更好的保障云环境下数据运行的安全,以人体免疫系统(Human Immune System,HIS)运行机理为理论依据,借鉴其功能特性,结合计算机免疫系统(Computer Immune System,CIS)和行为分析技术,提出了基于人体免疫原理和行为分析技术的云安全免疫系统(Cloud Security Immune System,CSIS),设计了CSIS运行机制和九个相关算法,并分析了其特点。  相似文献   

17.
The importance of business processes and the centrality of IT to contemporary organizations’ performance calls for a specific focus on business process management and IT management. Despite the wide scope of business process management covering both business and IT domains, and the profound impact of IT on process innovations, the association between business process management and IT management is under-explored. Drawing on a literature analysis of the capabilities of business process and IT governance frameworks and findings from a case study, we propose the need for horizontal integration between the two management functions to enable strategic and operational business—IT alignment. We further argue that the role of IT in an organization influences the direction of integration between the two functions and thus the choice of integration mechanisms. Using case study findings, we propose that IT as a business enabler respectively calls for sequential and reciprocal integrations at strategic and operational planning levels. Drawing on logical reasoning, we suggest that IT as a strategic driver necessitates reciprocal integration at both levels.  相似文献   

18.
大数据时代的信息安全管理体系研究是企业信息安全保障体系建设的重要组成成分,对完善企业信息安全体系建设,保障企业信息安全,提高企业信息化水平具有重要意义。针对大数据环境下企业信息安全管理体系进行理论框架和应用策略研究,分析安全管理现状,指出国内企业在大数据安全管理方面存在不足;探索大数据云安全管理体系构建,给出大数据云安全体系框架;研究大数据安全管理体系应用过程实施策略,给出过程模型及具体工作实施规划。为企业建立健全网络信息安全管理体系提供借鉴。  相似文献   

19.
云计算安全问题是限制云计算发展的主要问题,一直是IT 界研究的热点。介绍了云计算的特点和服务模式,总结了云计算的安全问题,最后根据云计算的层次架构探讨了解决各层次安全问题的安全策略,并在此基础上提出了一种云计算安全框架。  相似文献   

20.
银行等金融机构的批处理规模越来越大,对IT中心的资源配置要求也越来越高。为提高IT中心的资源使用效率和配置灵活程度,优化业务流程和加速IT新技术应用,可通过重新梳理批处理业务流程,根据资源需求类型分解为流程任务的方式,将批处理流程队列按照任务特征分解为任务队列,配置合适的任务队列处理资源,在批处理过程中动态监控和调度资源;另一方面,以基础架构资源虚拟化为核心的云计算技术逐步成熟,使IT 中心的资源虚拟化、配置管理的精细化成为可能。介绍了一种针对银行批处理业务流程优化、以虚拟化资源配置来实现批处理的技术框架,实现批处理流程任务队列的并行计算和动态资源配置。通过Ctrix服务器资源虚拟化技术进行初步模拟验证,实验结果表明,该技术框架在批处理执行效率、资源使用和配置灵活性方面的优势,在具有大量批处理业务和集约化处理的领域(金融、证券、电子商务),具有一定的应用和研究价值。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号